Search by Job Title

Associate Security ConsultantSecureInfo

THIS JOB HAS EXPIRED

Job Description:
Seeking highly motivated entry level individuals interested in developing a lucrative career in Cybersecurity. This is your opportunity to launch your career by working with a team of highly respected information security subject matter experts engaged in securing the world's largest and most complex networks and systems, including cloud computing solutions and highly classified Department of Defense networks.

Ideal candidates must possess a Bachelors Degree, or higher, in:

Electrical Engineering
Computer Engineering
Computer Science
Related Area
Experience and Skills:
Individuals with classroom and hands on experience in a combination of the following areas are highly desired:

Cybersecurity ? Well informed with principles and best practices for cyber security aspects of computer and network security.
Programming ? Acquainted with object-oriented programming principles.
Information Systems Management ? Familiar with developing information systems, organizational controls, and security.
Operating Systems- Experienced with computer operating systems and overall vulnerability of the network.
Network Security ? Well informed in networking technologies that are core to creating secure networks.
Digital Forensics ? Acquainted with how to prepare for incidents, how to respond to incidents, and how to reliably collect digital data.
Information Assurance and Security ? Conversant in information assurance topics such as fraud, eavesdropping, traffic analysis, intrusion detection and prevention, hacking, viruses, and cryptography.
Intrusion Detection and Incident Response ? Knowledgeable about intrusion detection methodologies and tools and the approaches to handling intrusions when they occur.
Network Operations ? Informed on physical security, electrical, patch management, data storage and retention, and backup and redundancy of data.
Secure Electronic Commerce - The legal environment of e-commerce, public and private key encryption, digital signatures, authentication, and third party certificates are topics that will be included.
IA Policies ? Abreast of policies that affect electronic security, such as privacy of information, intellectual property protection, and other policy matters.
Forensic Analysis ? Knowledgeable in collecting, examining, and preserving evidence of computer crimes.
Access Controls ? Well-versed in controlling access to information, to both files and facilities that involve different levels of identification, authentication, authorization, and accountability will be discussed.

Other Considerations:

Must be able to obtain and retain a Secret level government clearance
U.S. Citizens only
Must be able to travel 25%